From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 631ACC433E0 for ; Wed, 20 Jan 2021 13:14:19 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B6E2622210 for ; Wed, 20 Jan 2021 13:14:18 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B6E2622210 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Received: from localhost ([::1]:48954 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1l2DJR-000712-32 for qemu-devel@archiver.kernel.org; Wed, 20 Jan 2021 08:14:17 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:43182) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1l2DIY-0006a9-NM for qemu-devel@nongnu.org; Wed, 20 Jan 2021 08:13:22 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:57917) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.90_1) (envelope-from ) id 1l2DIW-00078z-Da for qemu-devel@nongnu.org; Wed, 20 Jan 2021 08:13:22 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1611148398; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=7XpgJk9Fr/XkFDY0b8D+bwgJyDRBISNLOK8ZXWHwc4k=; b=L06SAyvJT99b+d3xGlcy+bigFY6JITg0GyKGpGv/re+AuU0DNc9llUvjUhpUMYEqX5jbql qqUuiQTxEFw9V7VRqx6Fxv9fZGWBKMqd7BV+XlXWfjLBys1xnfLkn9OboIlbkk+sLfGqns dmO+ARWbwd4nYgBG+c13Y/u3B/uuISg= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-234-QPzNwK1fOXGF8a7G8I-gDQ-1; Wed, 20 Jan 2021 08:13:17 -0500 X-MC-Unique: QPzNwK1fOXGF8a7G8I-gDQ-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 476FB107ACE4 for ; Wed, 20 Jan 2021 13:13:16 +0000 (UTC) Received: from localhost (unknown [10.40.208.9]) by smtp.corp.redhat.com (Postfix) with ESMTP id 99B455C8A7; Wed, 20 Jan 2021 13:13:14 +0000 (UTC) Date: Wed, 20 Jan 2021 14:13:12 +0100 From: Igor Mammedov To: Vitaly Kuznetsov Subject: Re: [PATCH v3 18/19] i386: provide simple 'hv-default=on' option Message-ID: <20210120141312.0a1e6c33@redhat.com> In-Reply-To: <87h7ni7e08.fsf@vitty.brq.redhat.com> References: <20210107150640.539239-1-vkuznets@redhat.com> <20210107151449.541062-1-vkuznets@redhat.com> <20210115031142.7c171a7f@redhat.com> <87h7ni7e08.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=imammedo@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Received-SPF: pass client-ip=63.128.21.124; envelope-from=imammedo@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -29 X-Spam_score: -3.0 X-Spam_bar: --- X-Spam_report: (-3.0 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.167, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Paolo Bonzini , Marcelo Tosatti , qemu-devel@nongnu.org, Eduardo Habkost Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" On Fri, 15 Jan 2021 10:20:23 +0100 Vitaly Kuznetsov wrote: > Igor Mammedov writes: > > > On Thu, 7 Jan 2021 16:14:49 +0100 > > Vitaly Kuznetsov wrote: > > > >> Enabling Hyper-V emulation for a Windows VM is a tiring experience as it > >> requires listing all currently supported enlightenments ("hv-*" CPU > >> features) explicitly. We do have 'hv-passthrough' mode enabling > >> everything but it can't be used in production as it prevents migration. > >> > >> Introduce a simple 'hv-default=on' CPU flag enabling all currently supported > >> Hyper-V enlightenments. Later, when new enlightenments get implemented, > >> compat_props mechanism will be used to disable them for legacy machine types, > >> this will keep 'hv-default=on' configurations migratable. > >> > >> Signed-off-by: Vitaly Kuznetsov > >> --- > >> docs/hyperv.txt | 16 +++++++++++++--- > >> target/i386/cpu.c | 38 ++++++++++++++++++++++++++++++++++++++ > >> target/i386/cpu.h | 5 +++++ > >> 3 files changed, 56 insertions(+), 3 deletions(-) > >> > >> diff --git a/docs/hyperv.txt b/docs/hyperv.txt > >> index 5df00da54fc4..a54c066cab09 100644 > >> --- a/docs/hyperv.txt > >> +++ b/docs/hyperv.txt > >> @@ -17,10 +17,20 @@ compatible hypervisor and use Hyper-V specific features. > >> > >> 2. Setup > >> ========= > >> -No Hyper-V enlightenments are enabled by default by either KVM or QEMU. In > >> -QEMU, individual enlightenments can be enabled through CPU flags, e.g: > >> +All currently supported Hyper-V enlightenments can be enabled by specifying > >> +'hv-default=on' CPU flag: > >> > >> - qemu-system-x86_64 --enable-kvm --cpu host,hv_relaxed,hv_vpindex,hv_time, ... > >> + qemu-system-x86_64 --enable-kvm --cpu host,hv-default ... > >> + > >> +Alternatively, it is possible to do fine-grained enablement through CPU flags, > >> +e.g: > >> + > >> + qemu-system-x86_64 --enable-kvm --cpu host,hv-relaxed,hv-vpindex,hv-time ... > > > > I'd put here not '...' but rather recommended list of flags, and update > > it every time when new feature added if necessary. > > 1) > This is an example of fine-grained enablement, there is no point to put > all the existing flags there (hv-default is the only recommended way > now, the rest is 'expert'/'debugging'). so users are kept in dark what hv-default disables/enables (and it might depend on machine version on top that). Doesn't look like a good documentation to me (sure everyone can go and read source code for it and try to figure out how it's supposed to work) > > > (not to mention that if we had it to begin with, then new 'hv-default' won't > > be necessary, I still see it as functionality duplication but I will not oppose it) > > > > Unfortunately, upper layer tools don't read this doc and update > themselves to enable new features when they appear. rant: (just merge all libvirt into QEMU, and make VM configuration less low-level. why stop there, just merge with yet another upper layer, it would save us a lot on communication protocols and simplify VM creation even more, and no one will have to read docs and write anything new on top.) There should be limit somewhere, where QEMU job ends and others pile hw abstraction layers on top of it. > Similarly, if when these tools use '-machine q35' they get all the new features we add > automatically, right? it depends, in case of CPUs, new features usually 'off' by default for existing models. In case of bugs, features sometimes could be flipped and versioned machines were used to keep broken CPU models on old machine types. > >> +It is also possible to disable individual enlightenments from the default list, > >> +this can be used for debugging purposes: > >> + > >> + qemu-system-x86_64 --enable-kvm --cpu host,hv-default=on,hv-evmcs=off ... > >> > >> Sometimes there are dependencies between enlightenments, QEMU is supposed to > >> check that the supplied configuration is sane. > >> diff --git a/target/i386/cpu.c b/target/i386/cpu.c > >> index 48007a876e32..99338de00f78 100644 > >> --- a/target/i386/cpu.c > >> +++ b/target/i386/cpu.c > >> @@ -4552,6 +4552,24 @@ static void x86_cpuid_set_tsc_freq(Object *obj, Visitor *v, const char *name, > >> cpu->env.tsc_khz = cpu->env.user_tsc_khz = value / 1000; > >> } > >> > >> +static bool x86_hv_default_get(Object *obj, Error **errp) > >> +{ > >> + X86CPU *cpu = X86_CPU(obj); > >> + > >> + return cpu->hyperv_default; > >> +} > >> + > >> +static void x86_hv_default_set(Object *obj, bool value, Error **errp) > >> +{ > >> + X86CPU *cpu = X86_CPU(obj); > >> + > >> + cpu->hyperv_default = value; > >> + > >> + if (value) { > >> + cpu->hyperv_features |= cpu->hyperv_default_features; > > > > s/|="/=/ please, > > i.e. no option overrides whatever was specified before to keep semantics consistent. > > > > Hm, > > this doesn't matter for the most recent machine type as > hyperv_default_features has all the features but imagine you're running > an older machine type which doesn't have 'hv_feature'. Now your normally one shouldn't use new feature with old machine type as it makes VM non-migratable to older QEMU that has this machine type but not this feature. nitpicking: according to (1) user should not use 'hv_feature' on old machine since hv_default should cover all their needs (well they don't know what hv_default actually is). > suggestion is > > if I do: > > 'hv_default,hv_feature=on' I will get "hyperv_default_features | hv_feature" > > but if I do > > 'hv_feature=on,hv_default' I will just get 'hyperv_default_features' > (as hv_default enablement will overwrite everything) > > How is this consistent? usual semantics for properties, is that the latest property overwrites, the previous property value parsed from left to right. (i.e. if one asked for hv_default, one gets it related CPUID bit set/unset, if one needs more than that one should add more related features after that. > >> + } > >> +} > >> + > >> /* Generic getter for "feature-words" and "filtered-features" properties */ > >> static void x86_cpu_get_feature_words(Object *obj, Visitor *v, > >> const char *name, void *opaque, > >> @@ -6955,10 +6973,26 @@ static void x86_cpu_initfn(Object *obj) > >> object_property_add_alias(obj, "pause_filter", obj, "pause-filter"); > >> object_property_add_alias(obj, "sse4_1", obj, "sse4.1"); > >> object_property_add_alias(obj, "sse4_2", obj, "sse4.2"); > >> + object_property_add_alias(obj, "hv_default", obj, "hv-default"); > >> > >> if (xcc->model) { > >> x86_cpu_load_model(cpu, xcc->model); > >> } > >> + > >> + /* Hyper-V features enabled with 'hv-default=on' */ > >> + cpu->hyperv_default_features = BIT(HYPERV_FEAT_RELAXED) | > >> + BIT(HYPERV_FEAT_VAPIC) | BIT(HYPERV_FEAT_TIME) | > >> + BIT(HYPERV_FEAT_CRASH) | BIT(HYPERV_FEAT_RESET) | > >> + BIT(HYPERV_FEAT_VPINDEX) | BIT(HYPERV_FEAT_RUNTIME) | > >> + BIT(HYPERV_FEAT_SYNIC) | BIT(HYPERV_FEAT_STIMER) | > >> + BIT(HYPERV_FEAT_FREQUENCIES) | BIT(HYPERV_FEAT_REENLIGHTENMENT) | > >> + BIT(HYPERV_FEAT_TLBFLUSH) | BIT(HYPERV_FEAT_IPI) | > >> + BIT(HYPERV_FEAT_STIMER_DIRECT); > >> + > >> + /* Enlightened VMCS is only available on Intel/VMX */ > >> + if (kvm_hv_evmcs_available()) { > >> + cpu->hyperv_default_features |= BIT(HYPERV_FEAT_EVMCS); > >> + } > > what if VVM is migrated to another host without evmcs, > > will it change CPUID? > > > > Evmcs is tightly coupled with VMX, we can't migrate when it's not > there. Are you saying mgmt will check and refuse to migrate to such host? > > >> } > >> > >> static int64_t x86_cpu_get_arch_id(CPUState *cs) > >> @@ -7285,6 +7319,10 @@ static void x86_cpu_common_class_init(ObjectClass *oc, void *data) > >> x86_cpu_get_crash_info_qom, NULL, NULL, NULL); > >> #endif > >> > >> + object_class_property_add_bool(oc, "hv-default", > >> + x86_hv_default_get, > >> + x86_hv_default_set); > >> + > >> for (w = 0; w < FEATURE_WORDS; w++) { > >> int bitnr; > >> for (bitnr = 0; bitnr < 64; bitnr++) { > >> diff --git a/target/i386/cpu.h b/target/i386/cpu.h > >> index 6220cb2cabb9..8a484becb6b9 100644 > >> --- a/target/i386/cpu.h > >> +++ b/target/i386/cpu.h > >> @@ -1657,6 +1657,11 @@ struct X86CPU { > >> bool hyperv_synic_kvm_only; > >> uint64_t hyperv_features; > >> bool hyperv_passthrough; > >> + > >> + /* 'hv-default' enablement */ > >> + uint64_t hyperv_default_features; > >> + bool hyperv_default; > >> + > >> OnOffAuto hyperv_no_nonarch_cs; > >> uint32_t hyperv_vendor_id[3]; > >> uint32_t hyperv_interface_id[4]; > > >